Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/35264
題名: 使用ActiveX元件來改善暨有視窗主從企業資訊系統的可部署性
Improving the Deployability of Existing Windows-Based Client/Server Business Information Systems Using ActiveX Components
作者: 程裕繁
Cheng,Bill Yu-Fan
貢獻者: 裘錦天
Chyou,Jonathan Jiin-Tian
程裕繁
Cheng,Bill Yu-Fan
關鍵詞: ActiveX元件
遺產資訊系統
資訊系統現代化
資訊系統部署
資訊系統架構轉換
ActiveX Component
Legacy Information System
Information System Modernization
Information System Deployment
Information System Architecture Transformation
日期: 2006
上傳時間: 18-Sep-2009
摘要: 小型化革命已經造成了企業資訊系統的典範轉移,不久之前以大型主機為基礎的集中架構仍然是企業之重要資訊系統的唯一選擇,時至今日為數眾多的重要企業資訊系統採用了以個人運算裝置為基礎的主從架構。另外一方面,視窗主從企業資訊系統是目前最常見的主從架構企業資訊系統類型,此類企業資訊系統必需將每一支客戶端程式都安裝到每一位使用者的電腦上,這種客戶端程式的人工部署作業一直是資訊管理從業人員的沈重負擔,亦是資訊管理產學界持續戮力解決的重要研究課題。其實ActiveX元件技術的妥善應用將可以有效解決這個部署問題,並且這種解決方案將遠比其它解決方案更具成本效益。研究以此發現為基礎,目的在於克服ActiveX元件技術在企業資訊系統應用上一直無法解決的三項缺點:能力強大所衍生的不安全、技術龐雜所衍生的學習與使用困難,以及元件體積龐大所衍生的網路應用瓶頸,並提出一個以ActiveX元件為基礎的解決方案來自動化暨有之視窗主從企業資訊系統的客戶端程式部署作業。報告的重點內容有四:(一)ActiveX元件技術的缺點克服之道;(二) 所提解決方案的第一個部份,也就是下載架構,採用下載架構開發的企業資訊系統將具備自動化部署客戶端程式的特性;(三)所提解決方案的第二個部份,也就是架構轉換程序,藉由這個程序的指引,暨有的視窗主從企業資訊系統將可以輕鬆轉換成為下載架構,有效解決其客戶端程式的部署問題;(四)兩個研究個案,用來示範下載架構與架構轉換程序的使用,並提供證據來支持下載架構與架構轉換程序的可行性。
The downsizing revolution has created a deep paradigmatic shift in business information systems (BISs). Not very long ago, large-scale mission-critical BISs were the exclusive province of massive mainframe computers. That is changing rapidly. Today, increasingly large and complex BISs are being built as client/server (C/S) applications. Unfortunately, for the most common C/S BISs, that is, the Windows-based C/S BISs (WinBISs), client programs must be manually deployed to each end-user machine bringing about a heavy BIS maintenance load. ActiveX component technology, if used properly, is more cost-effective than other alternatives in improving the deployment of existing WinBISs. Nevertheless, ActiveX component technology is no magic solution, and thus still has three shortcomings, namely insecurity, complexity, and bulkiness. The purpose of the study presented in this paper is to overcome the shortcomings of ActiveX component technology, and then develop an ActiveX component-based solution to automate the deployment of existing WinBISs. This paper has four main parts: (a) the answers to the shortcomings of ActiveX component technology; (b) the downloadable architecture, which supports the development of automatically-deployed BISs; (c) the architecture transformation process, which transforms existing WinBISs into the downloadable architecture; and (d) two examples of how to use the downloadable architecture and the architecture transformation process. The examples also provide evidence to support the feasibility of such architecture and process.
參考文獻: 1.Babiker, E., Simmons, D., Shannon, R., & Ellis, N. (1997). A Model for Reengineering Legacy Expert Systems to Object-Oriented Architecture. Expert Systems With Applications, 12(3), 363-371.
2.Bailey, K.D. (2005). Typologies and Taxonomies: An Introduction to Classification Techniques. Thousand Oaks, CA: Sage.
3.Barron, T.M., Chiang, R.H.L., & Storey, V.C. (1999). A Semiotics Framework for Information Systems Classification and Development. Decision Support Systems, 25(1), 1-17.
4.Bennett, K.H., & Rajlich, V.T. (2000). Software Maintenance and Evolution: A Roadmap. Proceedings of the Conference on the Future of Software Engineering, Limerick, Ireland, 73-87.
5.Bodhuin, T., Guardaboscio, E., & Tortorella, M. (2002). Migrating COBOL Systems to the Web by Using the MVC Design Pattern. Proceedings of the 9th Working Conference on Reverse Engineering, Richmod, VA, 329-338.
6.Borland (2005). Borland Developer Studio 2006 Online Help. Scotts Valley, CA: Borland.
7.Carzaniga, A., Fuggetta, A., Hall, R.S., Heimbigner, D., van der Hoek, A., & Wolf, A.L. (1998). A Characterization Framework for Software Deployment Technologies (Tech. Rep. No. CU-CS-857-98). Boulder, CO: University of Colorado, Department of Computer Science.
8.Chappell, D. (1996). Understanding ActiveX and OLE. Redmond, WA: Microsoft.
9.Cheng, B.Y.F., Chyou, J.J.T., & Liu, J.J. (2007). Un-match: Object-Oriented Software Design Method and Visual Programming. International Journal of Soft Computing, 2(1), 199-207.
10.Chyou, J.J.T., & Cheng, B.Y.F. (2006). Improving the Deployability of Existing Windows-Based Client/Server Business Information Systems Using ActiveX. Lecture Notes in Computer Science, 4317, 249-263.
11.Coupaye, T., & Estublier, J. (2000). Foundations of Enterprise Software Deployment. Proceedings of the European Conference on Software Maintenance and Reengineering 2000, Zurich, Switzerland, 65-73.
12.David, G., & Shaw, M. (1993). An Introduction to Software Architecture. Advances in Software Engineering and Knowledge Engineering, Vol. I. River Edge, NJ: World Scientific.
13.Dershem, H.L., & Jipping, M.J. (1995). Programming Languages: Structures and Models. Boston: PWS.
14.Dolstra, E., Visser, E., & de Jonge, M. (2004). Imposing a Memory Management Discipline on Software Deployment. Proceedings of the 26th International Conference on Software Engineering, Scotland, UK, 583-592.
15.Edwards, A.D.N. (1988). Visual Programming Languages: The Next Generation. ACM SIGPLAN Notice, 23(4), 43-50.
16.Gray, D.N., Hotchkiss, J., LaForge, S., Shalit, A., & Weinberg, T. (1998). Modern Languages and Microsoft`s Component Object Model. Communications of the ACM, 41(5), 55-65.
17.Hall, R.S., Heimbigner, D., & Wolf, A.L. (1999). A Cooperative Approach to Support Software Deployment Using the Software Dock. Proceedings of the 21th International Conference on Software Engineering, Los Angeles, 174-183.
18.Hanna, M. (1993). Maintenance Burden Begging for Remedy. Datamation, 53-63.
19.Hassan, A.E., & Holt, R.C. (2005). A Lightweight Approach for Migrating Web Frameworks. Information and Software Technology, 47(8), 521-532.
20.Hnetynka, P. (2005). A Model-Driven Environment for Component Deployment. Proceedings of the 3rd ACIS International Conference on Software Engineering Research, Management and Applications, Mount Pleasant, Michigan, 6-13.
21.Hopwood, D. (1997). A Comparison Between Java and ActiveX Security. Network Security, 12, 15-20.
22.Hoque, R., & Sharma, T. (1998). Programming Web Components. New York: McGraw-Hill.
23.Inderscience (2007). International Journal of Business Information Systems Leaflet. https://www.inderscience.com/www/IJBIS_leaflet.pdf.
24.Jansen, S., Ballintijn, G., & Brinkkemper, S. (2005). A Process Model and Typology for Software Product Updaters. Proceedings of the 9th European Conference on Software Maintenance and Reengineering, Manchester, UK, 265-274.
25.Joiner, J.K., & Tsai, W.T. (1998). Re-Engineering Legacy COBOL Programs. Communications of the ACM, 41(5), 185-197.
26.Kazman, R., & Carriere, S.J. (1999). Playing Detective: Reconstructing Software Architecture from Available Evidence. Journal of Automated Software Engineering, 6(2), 107-138.
27.Klusener, A.S., Lammel, R., & Verhoef, C. (2005). Architectural Modifications to Deployed Software. Science of Computer Programming, 54(2-3), 143-211.
28.Krikhaar, R., Postma, A., Sellink, A., Stroucken, M., & Verhoef, C. (1999). A Two-Phase Process for Software Architecture Improvement. Proceedings of the International Conference on Software Maintenance 1999, Oxford, UK, 371-380.
29.Kristol, D.M. (2001). HTTP Cookies: Standards, Privacy, and Politics. ACM Transactions on Internet Technology, 1(2), 151-198.
30.Larson, K.D., Wild, J.J., & Chiappetta, B. (2005). Principles of Financial Accounting. New York: McGraw-Hill.
31.Laudon, K.C., & Laudon, J.P. (2005). Management Information Systems: Managing the Digital Firm. Upper Saddle River, NJ: Prentice-Hall.
32.Lee, H., & Yoo, C. (2000). A Form Driven Object-Oriented Reverse Engineering Methodology. Information Systems, 25(3), 235-259.
33.Lientz, B.P., & Swanson, E.B. (1980). Software Maintenance Management. Boston: Addison-Wesley.
34.Martin, E.W., Brown, C.V., DeHayes, D.W., Hoffer, J.A., & Perkins, W.C. (2004). Managing Information Technology. Upper Saddle River, NJ: Prentice-Hall.
35.Martin, J. (1990). Information Engineering, Book III: Design and Construction. Upper Saddle River, NJ: Prentice-Hall.
36.McNurlin, B.C., & Sprague, R.H. (2005). Information Systems Management in Practice. Upper Saddle River, NJ: Prentice-Hall.
37.Microsoft (1998). Microsoft Visual Basic 6.0 Online Help. Redmond, WA: Microsoft.
38.Microsoft (2007a). Activating ActiveX Controls. http://msdn.microsoft.com/library/default.asp?url=/workshop/author/dhtml/overview/activating_activex.asp.
39.Microsoft (2007b). ActiveX Controls. http://msdn.microsoft.com/library/default.asp?url=/workshop/components/activex/activex_node_entry.asp.
40.Microsoft (2007c). COM: Component Object Model Technologies. http://www.microsoft.com/com/default.mspx.
41.Mosley, D.C., Pietri, P.H., & Megginson, L.C. (1997). Management: Leadership in Action. Upper Saddle River, NJ: Prentice-Hall.
42.OMG (2001). CORBA/TC Interworking and SCCP Inter-ORB Protocol Specification. http://www.omg.org/docs/formal/01-01-01.pdf.
43.Oreizy, P., & Kaiser, G. (1997). The Web as Enabling Technology for Software Development and Distribution. IEEE Internet Computing, 1(6), 84-87.
44.Orfali, R., Harkey, D., & Edwards, J. (1999). Client/Server Survival Guide. Hoboken, NJ: Wiley.
45.Seacord, R.C., Plakosh, D., & Lewis, G.A. (2003). Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices. Boston: Addison-Wesley.
46.Sebesta, R.W. (2007). Concepts of Programming Languages. Boston: Addison-Wesley.
47.Serrano, M.A., Carver, D.L., & Montes de Oca, C. (2002). Reengineering Legacy Systems for Distributed Environments. Journal of Systems and Software, 64(1), 37-55.
48.Shaw, M., DeLine, R., Klein, D.V., Ross, T.L., Young, D.M., & Zelesnik, G. (1995). Abstractions for Software Architecture and Tools to Support Them. IEEE Transactions on Software Engineering, 21(4), 314-335.
49.Silberschatz, A., Galvin, P.B., & Gagne, G. (2004). Operating System Concepts. Hoboken, NJ: Wiley.
50.SyBase (2004). SyBase PowerBuilder 9.0 Online Help. Dublin, CA: SyBase.
51.Swanson, E.B., & Beath, C.M. (1989). Reconstructing the Systems Development Organization. MIS Quarterly, 13(3), 293-307.
52.Taconet, C., Putrycz, E., & Bernard, G. (2003). Context Aware Deployment for Mobile Users. Proceedings of the 27th Annual International Computer Software and Applications Conference, Hong Kong, China, 74-81.
53.Tahvildari, L., Kontogiannis, K., & Mylopoulos, J. (2003). Quality-Driven Software Reengineering. Journal of Systems and Software, 66(3), 225-239.
54.Turban, E., Mclean, I., & Whtherbe, J. (1996). Information Technology for Management: Improving Quality and Productivity. Hoboken, NJ: Wiley.
55.Ulrich, W.M. (2002). Legacy Systems: Transformation Strategies. Upper Saddle River, NJ: Prentice-Hall.
56.van der Hoek, A., & Wolf, A.L. (2003). Software Release Management for Component-Based Software. Software: Practice and Experience, 33(1), 77-98.
57.Vessey, I., Ramesh, V., & Glass, R.L. (2005). A Unified Classification System for Research in the Computing Disciplines. Information and Software Technology, 47(4), 245-255.
58.Wang, P.S., & Katila, S. (2003). An Introduction to Web Design and Programming. Boston: Course Technology.
59.Wheaton, G.R. (1968). Development of a Taxonomy of Human Performance: A Review of Classificatory Systems Relating to Tasks and Performance (Tech. Rep. No. 726-12/68-TR-1). Washington, DC: American Institute for Research.
60.Woods, S., Carriere, S.J., & Kazman, R. (1999). A Semantic Foundation for Architectural Reengineering and Interchange. Proceedings of the International Conference on Software Maintenance 1999, Oxford, UK, 391-398.
描述: 博士
國立政治大學
資訊管理研究所
91356506
95
資料來源: http://thesis.lib.nccu.edu.tw/record/#G0913565061
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File Description SizeFormat
56506101.pdf40.49 kBAdobe PDF2View/Open
56506102.pdf60.06 kBAdobe PDF2View/Open
56506103.pdf72.67 kBAdobe PDF2View/Open
56506104.pdf17.86 kBAdobe PDF2View/Open
56506105.pdf18.52 kBAdobe PDF2View/Open
56506106.pdf66.33 kBAdobe PDF2View/Open
56506107.pdf57.06 kBAdobe PDF2View/Open
56506108.pdf18.27 kBAdobe PDF2View/Open
56506109.pdf12.76 kBAdobe PDF2View/Open
56506110.pdf242.08 kBAdobe PDF2View/Open
56506111.pdf238.82 kBAdobe PDF2View/Open
56506112.pdf853.84 kBAdobe PDF2View/Open
56506113.pdf630.72 kBAdobe PDF2View/Open
56506114.pdf14.15 kBAdobe PDF2View/Open
56506115.pdf27.39 kBAdobe PDF2View/Open
Show full item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.